Page 90 - Cyber Defense eMagazine June 2020 Edition
P. 90

b)  Phishing

            On August 20, 2018, Portland, Oregon-based Legacy Health notified 38,000 patients that a phishing
                                                 iii
            attack might have breached their data . Further their investigation revealed that unauthorized third party
            gained  access  to  some  of  the  email  accounts  of  employees  that  may  have  contained  some  patient
            information e.g. patients’ name, dates of birth, health insurance information, billing information, medical

            information regarding care received at Legacy Health and, in some cases, social security numbers and
            driver’s license numbers.

            In a phishing campaign, an attacker poses as a legitimate person or entity in an email to get the target to
            provide valuable information, such as credentials, or click on a link that results in ransomware being

            downloaded on the victim’s machine. Employees who are not careful may click on the link or provide
            confidential details which may lead to fraud. According to the study conducted by Cofense “Payment
                                                                                iv
            Notification”  emerged  as  the  top  healthcare  phishing  attack  Subject .The  2018  Verizon  data  breach
            report revealed that phishing attacks are not only prominent, they’re also on the rise, with 43% of data
                                                   v
            breaches stemming from such incidents .

            c)  Insider threats

            On Jan 20, 2016, Wall street journal reported that five people, including two former research scientists of
            the pharmaceutical giant GlaxoSmithKline (GSK), were charged in the U.S. with scheming to steal trade

            secrets and sold them to the organizations operating in China . The stolen data included intellectual
                                                                          vi
            property such as information regarding the research development of multiple biopharmaceutical products.
            In 2018, both scientists pleaded guilty to committing intellectual property theft, but the exact amount of

            financial damage has yet to be calculated. Additionally, insider threats not only include employee stealing
            data but vary from incidents happening due to error or carelessness to theft of employee laptop containing

                            vii
            confidential data .

            d)  Technology management issues

            On Dec. 26, 2018, UW Medicine reported that misconfigured database lead to the exposer of patient data

            on the internet for several weeks. The exciting part is that breach was discovered by a patient looking for
            his own name on google and ended up finding the data related to UW medicine files containing patients’
            names,  medical  record  numbers,  and  a  description  and  purpose  of  the  information .  Other  than
                                                                                                  viii
            misconfigured databases or servers, lack of appropriate IT security implementation in the organization or
            IT vendors who are providing or managing IT solution on your behalf may be the reason for a data breach.







            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         90
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   85   86   87   88   89   90   91   92   93   94   95